Red Goat Insider Threat Report 2019

Red Goat Insider Threat Report 2019

Insider Threat Report 2019 finally released! Red Goat Cyber Security are proud to announce the results of their research into insider threat reporting. The research examines reporting observed in intentional insider threat cases and the factors that may influence the...
Teiss Podcast on Insider Threat

Teiss Podcast on Insider Threat

“I really enjoyed making this podcast with Anna Delaney. She always asks hard interesting questions and it was great fun to discuss some of the more alarming cases of insider threats. I hope you enjoy this colourful episode!” Spotting the Insider Threat with Lisa...
Tales from the road: Think before you speak

Tales from the road: Think before you speak

I recently went for a meeting at a company’s office. This company had a few floors in a shared office building. Due to a large amount of black coffee being consumed during the lengthy meeting I needed to find the ladies room before departing. Thankfully there was one...
The Hustlers of Naples

The Hustlers of Naples

Social engineering is a fascinating and diverse attack vector because it exploits human nature and people are generally predictable in their responses. We focus on malicious social engineering, especially when it facilitates cyber attacks upon organisations. However...
Simone – A social media investigation

Simone – A social media investigation

Speaking around the world about social engineering one question comes up almost every time. Why is social engineering so successful?   A key success factor in a targeted attack is good research, knowing the target and how to manipulate them. I have been gathering...